Ensurepass

QUESTION 71

A company is trying to implement physical deterrent controls to improve the overall security posture of their data center. Which of the following BEST meets their goal?

 

A.

Visitor logs

B.

Firewall

C.

Hardware locks

D.

Environmental monitoring

 

Correct Answer: C

 

 

 

 

 

QUESTION 72

A company’s employees were victims of a spear phishing campaign impersonating the CEO. The company would now like to implement a solution to improve the overall security posture by assuring their employees that email originated from the CEO. Which of the following controls could they implement to BEST meet this goal?

 

A.

Spam filter

B.

Digital signatures

C.

Antivirus software

D.

Digital certificates

 

Correct Answer: B

 

 

QUESTION 73

A security technician is attempting to improve the overall security posture of an internal mail server. Which of the following actions would BEST accomplish this goal?

 

A.

Monitoring event logs daily

B.

Disabling unnecessary services

C.

Deploying a content filter on the network

D.

Deploy an IDS on the network

 

Correct Answer: B

 

 

QUESTION 74

A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost or stolen?

 

A.

Application control

B.

Remote wiping

C.

GPS

D.

Screen-locks

 

Correct Answer: B

 

 

QUESTION 75

Which of the following is the primary security concern when deploying a mobile device on a network?

 

A.

Strong authentication

B.

Interoperability

C.

Data security

D.

Cloud storage technique

 

Correct Answer: C

 

 

 

 

QUESTION 76

Which of the following technical controls is BEST used to define which applications a user can install and run on a company issued mobile device?

 

A.

Authentication

B.

Blacklisting

C.

Whitelisting

D.

Acceptable use policy

 

Correct Answer: C

 

 

QUESTION 77

After a company has standardized to a single operating system, not all servers are immune to a well-known OS vulnerability. Which of the following solutions would mitigate this issue?

 

A.

Host based firewall

B.

Initial baseline configurations

C.

Discretionary access control

D.

Patch management system

 

Correct Answer: D

 

 

QUESTION 78

A security administrator discovers an image file that has several plain text documents hidden in the file. Which of the following security goals is met by camouflaging data inside of other files?

 

A.

Integrity

B.

Confidentiality

C.

Steganography

D.

Availability

 

Correct Answer: C

 

 

QUESTION 79

A company determines a need for additional protection from rogue devices plugging into physical ports around the building. Which of the following provides the highest degree of protection from unauthorized wired network access?

 

A.

Intrusion Prevention Systems

B.

MAC filtering

C.

Flood guards

D.

802.1x

 

Correct Answer: D

 

 

QUESTION 80

A company is preparing to decommission an offline, non-networked root certificate server. Before sending the server’s drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO? (Select TWO).

 

A.

Disk hashing procedures

B.

Full disk encryption

C.

Data retention policies

D.

Disk wiping procedures

E.

Removable media encryption

 

Correct Answer: BD

 

Free VCE & PDF File for CompTIA SY0-401 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.